oauth2-oidc
Assists with implementing OAuth 2.0 and OpenID Connect for secure authentication and authorization. Use when configuring authorization flows, validating tokens, implementing PKCE for public clients, setting up social login, or building secure token handling for SPAs, mobile apps, and APIs. Trigger words: oauth, oidc, openid connect, authorization code, pkce, jwt, access token, refresh token.
Usage
Getting Started
- Install the skill using the command above
- Open your AI coding agent (Claude Code, Codex, Gemini CLI, or Cursor)
- Reference the skill in your prompt
- The AI will use the skill's capabilities automatically
Example Prompts
- "Deploy the latest build to the staging environment and run smoke tests"
- "Check the CI pipeline status and summarize any recent failures"
Documentation
Overview
OAuth 2.0 is the industry standard for API authorization, and OpenID Connect (OIDC) extends it for user authentication. Together they provide Authorization Code + PKCE for secure token exchange, JWT-based identity tokens, refresh token rotation, and integration with identity providers (Auth0, Okta, Keycloak, Google, Azure AD) for social login and enterprise SSO.
Instructions
- When implementing authentication, use the Authorization Code + PKCE flow for all client types (SPAs, mobile, server) since it is the only secure flow; never use the deprecated Implicit or Resource Owner Password flows.
- When validating tokens on the API side, verify the JWT signature using the provider's JWKS endpoint, check
exp,iss, andaudclaims, and never trust client-side token validation alone. - When storing tokens in web apps, use
httpOnly,secure,sameSite=laxcookies; never store tokens in localStorage since it is vulnerable to XSS. - When managing token lifecycle, use short-lived access tokens (5-15 minutes) with refresh token rotation where each refresh token is single-use and a new one is issued with each refresh.
- When integrating a provider, use the discovery endpoint (
/.well-known/openid-configuration) for auto-configuration rather than hardcoding endpoints. - When implementing logout, revoke the refresh token, clear the session, and redirect to the provider's logout endpoint for complete session termination.
Examples
Example 1: Add social login to a Next.js app with PKCE
User request: "Implement Google and GitHub login for my Next.js app using OAuth 2.0"
Actions:
- Configure the OIDC providers with client IDs and redirect URIs
- Implement the Authorization Code + PKCE flow with state and nonce validation
- Exchange the code for tokens and validate the ID token JWT claims
- Store the session in httpOnly cookies with refresh token rotation
Output: A Next.js app with secure social login via Google and GitHub, PKCE-protected token exchange, and httpOnly cookie sessions.
Example 2: Secure a REST API with JWT validation
User request: "Add OAuth 2.0 token validation to my API endpoints"
Actions:
- Fetch the provider's JWKS from the discovery endpoint
- Create middleware that validates the access token signature, expiration, issuer, and audience
- Extract user claims and custom scopes from the validated token
- Return 401 for invalid tokens and 403 for insufficient scopes
Output: An API with JWT-based authorization that validates tokens against the provider's JWKS and enforces scope-based access control.
Guidelines
- Always use Authorization Code + PKCE since it is the only secure flow for all client types.
- Validate tokens on the API side: verify signature,
exp,iss, andaud; never trust client-side validation alone. - Use
httpOnly,secure,sameSite=laxcookies for token storage in web apps, not localStorage. - Implement refresh token rotation where each refresh token is single-use.
- Use the provider's discovery endpoint for configuration rather than hardcoding endpoints.
- Request minimum scopes needed:
openid emailfor login, not all available scopes. - Implement proper logout: revoke refresh token, clear session, redirect to provider's logout endpoint.
Information
- Version
- 1.0.0
- Author
- terminal-skills
- Category
- DevOps
- License
- Apache-2.0